Cooperation in Criminal Organizations: Kinship and Violence as Credible Commitments

Size: px
Start display at page:

Download "Cooperation in Criminal Organizations: Kinship and Violence as Credible Commitments"

Transcription

1 1 Cooperation in Criminal Organizations: Kinship and Violence as Credible Commitments Paolo Campana and Federico Varese Department of Sociology University of Oxford Final submission 9/12/2012 For correspondence: Department of Sociology, University of Oxford, Manor Road Building, Manor Road, Oxford OX1 3UQ, United Kingdom (Update July 2013: the final version is now out in Rationality and Society, 25(3): )

2 2 Cooperation in Criminal Organizations: Kinship and Violence as Credible Commitments Abstract The paper argues that kinship ties and sharing information on violent acts can be interpreted as forms of hostage-taking likely to increase cooperation among co-offenders. The paper tests this hypothesis among members of two criminal groups, a Camorra clan based just outside Naples, and a Russian Mafia group that moved to Rome in the mid-nineties. The data consist of the transcripts of phone intercepts conducted on both groups by the Italian police over several months. After turning the data into a series of network matrices, we use Multivariate Quadratic Assignment Procedure to test the hypothesis. We conclude that the likelihood of cooperation is higher among members who have shared information about violent acts. Violence has a stronger effect than kinship in predicting tie formation and thus cooperation. When non-kinship-based mechanisms fostering cooperation exist, criminal groups are likely to resort to them. Keywords: Cooperation--Trust--Credible Commitments Kinship Violence Russian Mafia - Camorra

3 3 Why would two criminals cooperate with each other in a criminal enterprise? 1 Most criminological studies of offenders and in particular of individuals involved in organized crime--assume away the problem of cooperation by invoking a specific subculture, social norms or sense of loyalty as the reason why criminals co-operate (Sutherland 1947; Cloward and Ohlin 1960; Salerno and Tornpkins 1969; Cressey 1972; Ianni 1972). These explanations presume the existence of something that has to be explained, namely why there is no mutual defection in the cooperative enterprise (Axelrod 2006; Coleman 1990; Lichbach 1996; McCarthy et al. 1998). Thieves may steal from each other; mobsters may whack their partners or turn state witnesses. For instance, Gottfredson and Hirschi (1990: 157, quoted in MacCarthy et al 1998: 158) maintain that serious offenders are unreliable, untrustworthy, selfish and thoughtless. Yet co-offending occurs in both the organized and disorganized sections of the underworld, as widely documented by, e.g., Reuter (1983 and 1985), Gambetta (1993), Levitt and Venkatesh (2000), Chu (2000), Varese (2001), Reuter and Greenfield (2001), Hill (2003) and Skarbeck (2011) for the former, and Sutherland (1937), Letkemann (1973), Padilla (1992), Adler (1993) and Shover (1996) for the latter. A candidate explanation for extensive co-offending is trust (McCarthy et al. 1998). Trust takes place within the context of an agreement or a promise: it is the decision by Actor A to transfer resources to Actor B in the expectation that B s action will at a later point in time satisfy the terms of the agreement (for related formulations, see Dasgupta 1988: 51 and Coleman 1990: 91). Such an approach however begs the question of how such an expectation is formed.

4 4 In the overworld, several mechanisms are at the disposals of agents who want to engage in mutually beneficial actions. They include the existence of legally binding contracts and an effective court system, well known reputations based on easily traceable information, known inner disposition of the trustee (trustworthiness), informal sanctions for those who break their words, and prior interactions (see, e.g., Dasgupta 1988; North 1990; Klein 1997; Hardin 2006; Axelrod 2006; Elster 2007: 347). These mechanisms increase the expectation that Agent B will fulfill her promise, making A more inclined to trust her, yet they do not completely eliminate the risk of defection. None of these mechanisms is perfect: for instance written contracts are incomplete and resorting to courts is a costly process. Thus, to varying degrees trusting others requires a leap of faith even among agents who engage in legal transactions. For instance, in newly formed market economies, where the legal system is ineffective and business reputations have not yet been fully established, such leap will be greater than in functioning market economies (Varese 2001). In the underworld, actors face more natural obstacles to overcome. By definition, one cannot turn to the state to protect stolen or illegal assets. Information about the quality of goods and services is hard to come by as there are no reputable and easily accessible sources of unbiased information. One cannot even be sure that the person offering a deal is not an undercover agent or a police informant. Regardless of personal inclination to cheat, actors in the underworld are difficult to locate, as they move around frequently. Entrepreneurs in these markets cannot freely advertise their good reputation, creditors disappear, informants consort with the police, and undercover agents try to pass themselves off as bona fide fellow criminals (Gambetta 2009; Varese 2006: 419 and 2011: 24). Thus, scholars have concluded that trust is scarce in the underworld. 2 Joseph Pistone, the FBI special agent who infiltrated the Bonanno Family for six

5 5 years under the fictitious name of Donnie Brasco, suggests that trust is in scarce supply even among mafia members: Everybody s playing the same bullshit game, trying to keep as much as they can, pass along as little as they can get away with, regardless of what the rules say. They always fudge. They figure, they re out doing the job, who wants to give up half of what they get to somebody that s not even there? So you never told anybody the whole story with money... That was the standard. It goes way right up the line. That s why nobody totally trusts anybody. (Pistone and Woodley 1997: 79; italics added) The Sicilian Mafioso-turned-state-witness Tommaso Buscetta recalls in his memoirs that once I told the authorities that, if they are to make life for criminals impossible, they should seize [some drugs] without telling anybody. This will throw the criminal groups into chaos. Nobody will believe the others word, their vindications, and everybody will accuse the other fellow members of embezzling the goods and not keeping to the agreements (Arlacchi 1994: 89). Buscetta suggests that the reasons to trust others in the underworld are few and far apart. Yet Mafias do exist and illegal activities are carried out throughout the world on a daily basis. In this paper we focus on two mechanisms that help Mafiosi increase their expectation that somebody else is to be trusted, thereby making cooperation more likely: shared kinship ties and violence. Criminal bosses need agents to implement their decisions and carry out their orders, but cannot be sure that such orders will be followed. A way to solve this dilemma is to entrust to kin some key tasks. As they have a stake in the future performance of the organisation, as they might well inherit it, they are more likely to align their interests to those of the group. In addition, information about the identity and whereabouts of a member of kin is usually more cheaply

6 6 available than information about a stranger; as a consequence, inflicting a punishment on the relatives of a deviant member is easier if the latter shares blood ties with the boss or other associates. Indeed, during the so-called Second Mafia War (Sicily, ), eight of Buscetta s relatives including two sons and a brother were murdered, although they had no role in the Mafia (Repubblica 17/VII/1984). After he defected, more were killed (Arlacchi 1994). Violence is the less well-understood mechanism we focus upon in this paper. Using force is not only a constitutive element of criminal groups. It also conveys information on the quality of the people one commits violence with. In addition, it acts as a source of compromising material on the people involved, thus one is less likely to defect if he knows he can be shopped for a previous act of violence. As a by-product, violence serves as a credible commitment among mobsters. The paper continues as follows. In Section 1 we expand on the theoretical question and discuss credible commitments and cooperation. We argue that kinship and violence can be seen as devices to increase cooperation in criminal organisations and spell out our hypotheses. Sections 2 and 3 present the data and the method of analysis respectively. In Section 4 we present the results, while in the last section we draw the main conclusions. 1. Credible Commitments among Criminals: the Role of Kinship and Violence Illegal activities are characterised by some distinctive features. Firstly, all participants risk arrest, imprisonment or some forms of punishment if their involvement is revealed to the authorities. Secondly, no legal mechanism of contract enforcement and dispute settlement is available. The

7 7 lack of such tools would not be a problem if participants in illegal ventures did trust each other fully and completely; but as the anecdotal evidence shows, informal yet credible commitments go some way towards increasing the likelihood of cooperation (Williamson 1983). As Schelling explained (2006: viii), when we commit to a relationship, a promise or a negotiating position, we sacrifice some of the options, choices or opportunities that we may otherwise hold; in a sense, we deliberately bind ourselves to some course of action or inaction. We do this with the purpose of influencing someone else s choices (Schelling 2006: 1). A credible commitment to taking relevant actions increases the expectation that B s action will satisfy the terms of the agreement. In order to make cooperation possible, the two parties involved must first assess the likelihood that the other party will fulfil the agreement. One of the parties, or both, may thus wish to credibly commit themselves to a given course of action that will reassure the counterpart (Cook, Hardin and Levi: 37). In the case of criminal groups, the parties involved must assess the reliability of the counterpart in some crucial dimensions. These include willingness to defect from the group and/or inform on fellow associates. In order for an exchange to happen, both parties must be assured to a reasonably high degree that they are not dealing with a potential defector or informant. In other words, we expect a criminal to be much more willing to cooperate with another individual if he is sure that the counterpart will not inform on him or report him to the police. When there are no legal devices binding two parties, establishing credible commitments becomes crucial. In a nutshell, what a credible commitment does is to increase the cost of pursuing the undesirable course of action, thus making it less likely to happen if not wiping out that possibility altogether.

8 8 Cook, Hardin and Levi (2005: 37) spelled out three possible strategies for making a given commitment a credible one when acting in the absence of trust and the law. The first strategy involves a third party overseeing and enforcing the commitment; the second strategy consists in cutting off options; and the third strategy is taking hostages. Below, we briefly review them. (a) Third-party enforcement. In most contexts, state institutions affect cooperation by acting as third-party enforcers of deals and promises, assuming that they are perceived to be fair and relatively cheap (Hobbes 1651: ch. 13; Cook, Hardin and Levi 2005: ). In the criminal world, the only illegal organisations that may provide some sort of third-party enforcement are Mafia-like organisations and prison gangs. As empirical works have shown, they offer illegal private protection, including dispute settlement and the enforcing of illegal contracts (Gambetta 1993; Chu 2000; Varese 2001; Hill 2003; Campana 2011; Skarbeck 2011 and 2012). Nonmembers turn to the Mafia for these services when they cannot use the state. While Mafias may supply enforcement services to external agents operating in their territories, how do Mafiosi themselves come to cooperate with each other? For instance, how can a Mafia boss be certain that a member of the group will carry out his order, will not cheat, or inform the authorities or rival gangsters? In this scenario we argue mobsters and criminals who cannot turn to a Mafia can follow two possible strategies used extensively throughout history by military leaders and politicians: cutting off options and hostage-taking. b) Cutting off options. An instance of this strategy, cited by Schelling, is the decision of Xenophon, the ancient Greek military commander, to halt his army against a ravine during the

9 9 fight against the Persians. When one of his generals expressed concern about having a ravine at their rear which would prevent any escape Xenophon replied that the enemy would think they could retreat in every direction while his army would know that there was only one safe option for them: victory (Xenophon 1957: , quoted in Schelling 2006: 1). As Schelling writes, Xenophon notes that when retreat is impossible, no soldier need fear that while he is preoccupied with the enemy his companions in arms will desert him; the commitment is thus to each other, as well as toward the enemy (Schelling 2006: 1). Criminal groups also employ such strategy. For instance, members of the Japanese Yakuza are notorious for having their bodies covered in tattoos, as do members of some prison gangs in Russia and America. Body tattoos serve (also) as a cutting-off strategy. Provided that a certain image is associated with a specific criminal group, the authorities and the general public have knowledge of this association, and tattoos cannot be hidden and/or removed from the body, having a criminal tattoo on one s body means relinquishing the option of going back to a noncriminal life. That person would find it extremely difficult, if not impossible, to leave the underworld, and thus will be committed to staying in the criminal world as long as he can, since no other options are available to him (and those exit options may be extremely costly). The Yakuza also inflicts a very peculiar form of punishment on members who misbehave, namely cutting off a part of a finger. Such a punishment may also serve to reduce the options of a member. It will be hard for anybody with such a sign to pass off as an upstanding member of the community and obtain legitimate employment, as pointed out by a newspaper article on the Yakuza: Not surprisingly, alternative employment has been difficult to find for the recently redundant mobsters. Any of the gang members who want to wash their feet of the gangs, as the

10 10 Japanese expression puts it, can grow out their tight curls and cover up the tattoos but the missing fingers remain a permanent giveaway (The Telegraph, 28/III/2003). 3 There is however a cost to this strategy: it reveals to the police and the public at large that an individual is a member of the criminal group. Covering the members body with tattoos and cutting off their fingers easily gives away that crucial information. Thus, this strategy works best when membership of a criminal group in itself is not illegal, as indeed is the case for the Yakuza in Japan. Sicilian Mafiosi sport neither tattoos nor any missing fingers. c) Hostage-taking. Taking hostages to guarantee promises is a practice that has a long and welldocumented history. Ancient Romans, for instance, started resorting to it as early as the end of the Second Punic War in 202 BC (Allen 2006: 10). They used to take hostages from the conquered territories and hold them in Rome to serve as assurances for the post-war settlement (Allen 2006: 3). The profile of the hostages was often specified in a formal treaty with the losing powers, and hostages were usually required to stay in Rome until the end of wartime indemnity payments (Allen 2006: 5). Each hostage s binding value was directly related to his proximity to the ruling elite of the conquered territory: the closer to the elite, the more valuable for the Romans. The British monarchy and parliament resorted to the same strategy to ensure monarchs safety when they travelled to parliament to deliver their annual speech. This practice still continues nowadays, albeit merely ceremonial. 4 Over the years, hostage-taking strategies have developed in such a way that their binding power can be ensured without having to hold any physical hostages. Under some specific circumstances, the withholding of non-physical goods such as information is a viable substitute for physical captivity.

11 11 We argue below that hostage-taking strategies are used by criminals to establish credible commitments, and are thus conducive to the creation of bonds among them. As a result, they foster cooperation. Kinship Since at least the Kefauver Senate committee investigating organized crime ( , see Wade 1996), kinship has been linked to the Mafia in academic and public debates in the United States. Cosa Nostra was described as a conspiracy of Italians who were trying to corrupt American institutions (Kefauver 1952). Clearly, such a view was flawed and potentially racist. However, even early critics of such a view conceded that shared kin ties can serve as a bond among criminals. For instance, Dwight C. Smith, author of The Mafia Mystique (1975) and a critic of the Alien Conspiracy Theory of Organised Crime, maintains that ethnic ties provide the strongest possibility of ensuring trust among persons who cannot rely on the law to protect their rights and obligations within cooperative but outlawed economic activity (Smith 1980: 375). In a criminal organisation, kinship increases compliance and reduces defection by giving the offspring and relatives a future orientation that aligns their incentives with that of the organisation. The future-oriented incentive to motivate compliance is the prospect of taking over the company in a not-so-distant future, or at least to share in its profits. 5 In addition, kinship operates as a form of hostage-taking: if a member feels disgruntled with the organisation and wishes to defect, he will put his entire family at risk. The organisation will easily be able to punish his most immediate relatives, who in effect are hostages of the organisation. In other words, kinship provides cheaper information about the identity and whereabouts of the members relatives. 6 In addition, it will be harder for the member to conceal his intention to defect than if

12 12 he had no relatives within the group. The kinship link has indeed meant that the two Italian Mafias that recruit on the basis of kinship the Neapolitan Camorra and Calabrese `Ndrangheta have experienced significantly fewer defections (pentiti) than the Sicilian Mafia. 7 Violence Violence is a constitutive element of Mafia-like organisations. It would be impossible to control and govern markets, including that of illegal private protection, without the ability to resort to violence when needed. Yet violence is costly to deploy, and criminal groups may seek alternative strategies to economise on its actual use. One consists in developing an effective reputation for being violent; if credible, this reputation may decrease the need for the actual use of force (Reuter 1983: 137 8; Gambetta 1993: 43 6). An act of violence also conveys information, which can be intentionally hidden, unintentionally revealed or intentionally shared. This information can be used against the actor who has committed violent acts, e.g. the perpetrator can be reported to the police and consequently face legal punishment. Because of its intrinsic potential for damage, information can also be employed as a hostage in establishing a credible commitment. In The Strategy of Conflict, Thomas Schelling (1963: 43) maintains that individuals may commit acts of violence as a convincing, self-binding, promise, as in the following hypothetical case of a kidnapper and his prisoner: Both the kidnapper who would like to release his prisoner, and the prisoner, may search desperately for a way to commit the latter against informing on his captor, without finding

13 13 one. If the victim has committed an act whose disclosure could lead to blackmail, he may confess it; if not, he might commit one in the presence of the captor, to create the bond that will ensure his silence (Schelling 1963: 43 44). Gambetta expands on Schelling by arguing that information on any deviant act contains compromising information: members of groups who engage in deviant actions reinforce their internal loyalty by exchanging evidence of their misdeeds, an act that commits them to mutual silence (Gambetta 2009: 66). These groups range from paedophile rings to the Mafia. While in some cases the exchange of compromising information is an intentional strategy of either the boss or the criminals themselves (Schelling 1963; Gambetta 2009), credible commitments of this kind might well be the unintentional by-product of engaging in the day-today operations of the group. We do not assume that talking about violence is an intentional or deliberate strategy to bind the group together. Thus, shared kinship and shared information about violent acts can serve to establish a credible commitment among two or more parties, and as a consequence foster cooperation among them. In this article we test two related propositions: 1. The likelihood of cooperation is higher among members who are related. 2. The likelihood of cooperation is higher among members who have shared information about violent acts.

14 14 The implicit assumption of the hypotheses is that the more contacts two members exchange, the higher the degree of cooperation between them. In order to test the two hypotheses we rely on relational data on the members of two distinct Mafia-like organisations a Neapolitan Camorra clan and a Russian Mafia group as explained below. Our dependent variable is tie formation among individuals who have been arrested together. We maintain that co-arrest data can be taken as a concrete form of co-operation, as suggested by McCarthy et al (1998: 156). 2. The Data This paper relies on two unique datasets we have collected on two Mafia-like organizations: a Neapolitan Camorra clan based some 50 kilometres north of Naples, and a Russian Mafia group operating in Rome. The Neapolitan clan, named after the founder, has been active since the 1970s. The group controlled both legal and illegal markets in the town of Mondragone, and had international ramifications in Scotland and Amsterdam. The group was disbanded around 2003, when the boss and all key members became state witnesses. The Russian group is part of the Moscow-based Solntsevskaya crime group. The group runs a protection racket throughout Moscow, termed roof (krysha) in Russian, controlling access to valuable markets (Varese 2001). The organisation is governed by a council of twelve individuals. In 1994, a member of the ruling council decided to move to a town on the Lazio seaside near Rome with part of his crew in order to avoid becoming embroiled in a conflict at the top of the organisation. The group he constituted comprised Russians and Italians he recruited in Rome.

15 15 Both groups had been under extensive police surveillance, during which investigators were able to monitor all the telephone lines used by the key players, and listen to their conversations. The investigation of the Camorra clan lasted for seven months during which 8 individuals were put under round-the-clock surveillance; in the Russian Mafia case police were able to wiretap the phone lines of 19 people for nine months. In both instances we had access to the files prepared by the police for the Prosecutor Office to be used as evidence in court; they include the transcripts of the wiretapped phone conversations. We decided to code the information contained in these files as network data. Other scholars have utilized this type of data when studying organized crime groups (Baker and Faulkner 1993; Finckenauer and Waring 1998; Natarajan 2000 and 2006; Morselli 2009; Calderoni 2012; see also Von Lampe 2009). Broadly speaking, we follow Natarajan (2000 and 2006) in coding both the structure and the content of the ties among the actors. In addition, we concluded that our data meet the validity and reliability requirements identified in Campana and Varese (2011). In order to identify who was in contact with whom within the group, we carried out a systematic content analysis of the conversations included in the court files. Since the conversations are informal, and jargon is often used, we decided to read and code each conversation manually. Besides the information about whether two actors developed a contact or not, we were also able to code some additional characteristics of each contact, including date and place, and whether violence and threats were mentioned. We were also able to code their gender, nationality and the presence of a blood tie with the boss or any other member of the group.

16 16 We have developed a coding scheme to classify the purpose of each contact. This scheme is based on four main tasks : group management (GM), resource acquisition (RA), protection activities (PA) and economic investments (E). Group management refers to conversations on the day-to-day management of the group, including the remuneration of the workforce and the activities of monitoring, intimidation and punishment of the group s members; resource acquisition refers to discussion about the acquisition of specific input to run the groups, including fake documents and clean bank accounts; protection activities refers to the efforts to supply illegal protection and control markets; economic investments refers to discussions on business investments carried out in the legal and illegal economy. In the case of the Neapolitan Camorra, economic investments had been further split into investments in the legal economy (Eleg) and those in the illegal economy (E-ill). By having coded tasks that do not require the use of violence, we will be able to test whether actors who share information on violence are more likely to cooperate on such tasks. The Neapolitan Camorra dataset includes 1824 contacts occurring among 202 actors, and the Russian Mafia dataset includes 758 contacts and 164 actors. In the Russian Mafia dataset each contact is a phone conversation; in the Neapolitan Camorra case the coding procedure has been expanded to include not only the phone conversations wiretapped by the police (N=1029) but also other types of contacts as they emerge from the content of the conversations (N=795). These include face-to-face meetings, letters to/from jail and phone calls mentioned by the actors and not directly wiretapped by the police (on this, see Campana 2011: ). 8

17 17 Not all the actors included in those networks are fully-fledged members of their respective groups; in fact, the two networks of contacts include all the individuals that have established a contact with the core members for a wide range of crime-related activities (some of them willingly established a contact while others were forced to do so). In this paper, we focus only on the relations (contacts) between the core members whose names appear in the two indictments (in other words, we use co-arrest data of core members). Based on the information included in the indictments, we took the decision of classifying as core members only those actors who have been charged with the Mafia-association criminal offence (article 416bis of the Italian penal code). They number 51 in the case of the Neapolitan Camorra and 22 in the case of the Russian group. The network of contacts between the core members of the Neapolitan Camorra clan amounts to 1370 while the core members of the Russian group have exchanged a total of 295 contacts among them. All the analyses discussed in this paper are based on members-only networks. Table 1 summarises some characteristics of the two criminal groups. [TABLE 1 HERE] A difference between the two groups relates to kinship. Camorra clans are extensively based on kin-ties: the criminal and the blood family tend to overlap. In the Camorra clan discussed here, 21 members share blood ties with the boss of the group (22 including the boss: 43%). Russian Mafia groups are different, and in this respect much more similar to the Sicilian Mafia, where members are not recruited based on their kinship. In the group under scrutiny, only one member shares a blood tie with the boss. Although kinship seems not to play a prominent role in the Russian case, this does not mean that kinship is altogether absent. A weaker form of kinship can

18 18 still be detected: 12 members (54%) share a blood tie with at least another member of the group (not necessarily the boss). We call this type of kinship extended. As for the violence, only 37% of the Camorra members shared some information about violence in their conversations with fellow associates, a percentage much lower than that recorded for the Russian Mafia group, in which 73% of the members did so. This may be a consequence of the difference in size of the two groups: the Russian group is smaller than its Neapolitan counterpart, and therefore it is plausible that roles within the group are less specialised. This is confirmed by the number of members that have carried out three or more different tasks: 49% for the Camorra clan and 82% for the Russian group. In our coding, violence includes instances in which violent acts were discussed and then actually carried out as well as the planning of future acts. Violence was directed towards insiders and outsiders alike. Discussing acts of violence is not cheap talk in criminal organisations: we know from the evidence collected by the police that some of the incidents discussed in the tapes were effectively carried out; others were foiled by the police intervention or put off by the criminal themselves. However, we believe that also the latter have some value as proxies for the actual involvement of a certain member in violent acts. The episodes discussed by the Russian criminals include two distinct kidnappings, a number of assaults and a murder (all actually carried out) as well as other instances of kidnappings and assaults allegedly perpetrated in Russia. 9 In the Camorra case, instances involving some degree of violence include an assault against a group member, a number of violent actions to recover debts and collect the protection racket fee, and physical threats to a witness testifying in a trial against the group. One murder was about to be carried out and was only stopped by the police swooping on the clan.

19 19 In both cases not all the members have shared information about violence with their fellow associates; thus we can test whether the likelihood of a tie formation is higher (1) among members who share kinship; and (2) among members who shared compromising information about violent acts. In the following pages, we present the result of a MRQAP regression model on tie formation among the Mafiosi (core members); before that, we discuss the data analysis technique used in this article. 3. The Method: MRQAP Regression Social network data is dyadic by definition in the sense that they refer to the relations between pairs of objects. Since the unit of analysis is a dyad, it cannot be assumed that the observations are independent of one another (Krackhardt 1988: 360); this generates a problem of autocorrelation, or non-independence of the observations, that makes the standard regression techniques unfeasible for the analysis of this specific kind of data (standard regression postulates the independence of the observations). More specifically, standard inferential tests cannot be used in the case of network data, given the lack of independence between the observations within the rows and within the columns, which in turn may lead to biased test results (Krackhardt 1987: 174; Dekker, Krackhardt and Snijders 2007: 563). This problem has been widely recognised in the literature. 10 Based on the work of Mantel (1967), Hubert and Shultz (1976) proposed a method for testing hypotheses when dealing with dyadic relational structures; this

20 20 method was developed further by Hubert (1985; 1987) and Krackhardt (1987, 1988). Both the Hubert and the Krackhardt approaches fall into the Quadratic Assignment Procedure family (QAP); they are both permutation tests, but they differ in the way permutations are performed. The QAP procedure can be summarised as follows: through a series of random permutations of the n objects of a matrix O j and the creation of new isomorphic matrices, identical to the original but for the order of the objects, the QAP procedure provides a permutation- or randomisationbased nonparametric test of the dependence between two square matrices of the same size (Dekker, Krackhardt, Snijders 2007: 565 6). QAP first performs an OLS (ordinary-least-squares test of significance) estimate of regression coefficients on the original matrix, and then starts a large series of OLS estimates using randomly permuted dependent matrices (in our case 10,000 permutations). Finally, it compares the original estimate against the distribution of the results of the permuted regressions: if fewer than 5% of the regression coefficients (beta) are larger than the observed data, then the coefficient is considered significant at the 0.05 level and the same goes for the 1% and 0.01 level of significance (Kilduff and Krackhardt 1994: 99). 11 The multivariate version of the QAP procedure (MRAQP) allows researchers to assess the association between two variables X and Y, controlling for other variables Z n. The approach taken is very similar to that of multiple linear regression (Dekker, Krackhardt, Snijders 2007: 566). The QAP approach has been widely used to study dyadic data in many disciplines including biology, ecology, management, psychology, statistics and sociology (Dekker, Krackhardt, Snijders 2007: 565; see also Legendre 2000; Hubert 1987; Tsai and Ghoshal 1998); it derives much of its popularity from keeping many of the benefits of multiple regression analysis while at the same time offering a viable solution to problems of autocorrelation inherently present in network data (Dekker, Krackhardt, Snijders 2007: 578). 12 In this paper we

21 21 use the Double Dekker Semi-Partialling MRQAP procedure implemented in Ucinet 6 (Borgatti, Everett and Freeman 2002). 4. Results and Discussion The data we extracted from the phone conversations wiretapped by the police enables us to establish how many times two members of a given group exchanged a contact. These individuals have all been arrested together. We take this measure to be a proxy for cooperation. The more contacts two members exchange, the higher the degree of cooperation between them. Although in the abstract some contacts may be associated with conflict rather than cooperation, contacts associated with conflict play a much smaller role than the cooperative ones. First, in the case of the Neapolitan Camorra, only 10.1% of the overall contacts were devoted to addressing internal problems (potentially some of these could refer to situations of conflict among the members). In the Russian case, quarrels within the group clearly emerged in only eight contacts (1.1%). Overall, the two groups were fully functioning at the time of the investigation, carrying out businesses and performing tasks; their activities would eventually be disrupted only after police intervention. A thorough reading of the content of the conversations recorded also supports our decision to use the number of contacts exchanged as a proxy for cooperation. We start by assessing whether sharing kinship ties and information about violent acts have an impact on the actual tie formation among the members. In both models shown in Table 2, the dependent variable is an incidence squared matrix with the same list of actors repeated in both columns and rows; in any given cell we recorded the number of contacts shared by a given pair of actors (a continuous variable). We took the decision to code all the contacts as undirected so

22 22 that directed phone conversations and face-to-face meetings, which tend to be undirected, could be counted together: this applies specifically to the Camorra dataset. However, for the sake of homogeneity, we decided to apply the same coding rule to the Russian Mafia dataset. In addition, we decided to symmetrize our matrices, disregarding any possible distinction between sender and receiver. After checking for normality, a natural logarithm transformation of the dependent variable was performed to make the estimations more robust. 13 We use a number of dichotomous matrices as independent variables. The first is an incidence matrix in which we recorded whether two actors had shared some information about violent acts. The second matrix records whether actors shared a kinship tie. In the case of the Neapolitan Camorra this means whether two actors share the characteristic of being near-relatives of the boss, and for the Russian Mafia whether two actors share any kind of kinship between them ( kinship extended ). Since the Russian Mafia group includes both Russian and Italian associates, we also controlled for the nationality of the actors (whether two actors share the same nationality). In addition, since we know the main reason behind each contact (task), we also controlled our estimates for the effect of sharing the same task. The assumption here is that a common involvement in the same criminal activity may actually increase the need for cooperation between two actors. This has been done by including in the model four dichotomous matrices, one for each task (GM: group management; RA: resource acquisition; PA: protection activities; E: economic investments). [TABLE 2 HERE]

23 23 Kinship does indeed have a statistically significant effect in the Camorra clan: the frequency of contacts between two associates increases when both are near-relatives of the boss. This finding confirms the importance of kinship within this particular Mafia. Extended kinship appears to play a role in the case of the Russian Italian group. Rather more surprisingly, in both models violence does have an impact on tie formation between two actors. Having shared information about violent acts increases the frequency of contacts occurring among two actors. The violence effect is fairly strong, and greater than that recorded for kinship in both cases, including the Camorra. This would suggest that even in clans made of relatives, having discussed violence is a better predictor of cooperation than kinship itself. This further suggests that there is nothing ontological in the role of kinship in organised crime. When better and more reliable mechanisms to increase commitment are available, criminals will use them, just as organizations in advanced societies tend to rely on merit rather than kinship when recruiting employees (Weber [1922]1978). Are there alternative model specifications to the one we chose? One could conceivably reverse the causal link and think of number of ties (IV) as leading to discussions of violence. 14 A test of the plausibility of our modeling choices is presented in the Appendix. In Table A1 we report the results of a model testing whether number of ties are predictors of Violence, controlling for Kinship (extended for the Russians only), Nationality (for the Russians only), Investments in the Economy (E), Group Management (GM), Protection Activities (PA) and Resource Acquisition (RA). Notably, the tasks that we know involve the use of violence (PA and GM) have negative coefficients with Violence as the dependent variable. This suggests that the dyads who perform more Protection Activities and Group Management tasks are less likely to have discussed violence, controlling for the frequency of contacts, kinship, nationality and the non-violent tasks.

24 24 This makes little, if any, empirical sense. Moreover, when we exclude number of contacts from the model, PA and GM become positively related with Violence, as we would expect. While it is next to impossible to rule out completely the argument that reverse causality is at work, we feel confident that these additional tests make our model more plausible. There is additional, non-statistical evidence of the use of violence as a form of credible commitment. The boss of the Camorra clan discussed here would instruct all his men to shoot together at the same time when committing a murder. Everybody in the firing squad had to fire at least one shot. This is what Italian investigative journalist Roberto Saviano writes in his book Gomorrah: Murders that could be taken care of by one or two men were instead carried out by all his [the boss s] most trusted legionnaires, who were usually expected to fire at least one shot, even if the person was already dead. One for all and all for one. Augusto [the boss] required full participation, even when it was superfluous (Saviano 2007: 273). Each perpetrator is made a hostage to all the others, in order to reduce his incentives to defect and/or inform on his fellow associates. 15 We suggest that shared kinship and exchanging information about violent acts increase the expectation that actor B is to be trusted in the eyes of actor A. The underlying mechanism is the formation of a credible commitment. If committing acts of violence increases cooperation, one should expect that such cooperation extends to other, non-violent activities as well. In order to test this proposition, we need to consider tasks that are not associated with the use of force. We do so by taking into consideration

25 25 violence-free tasks only; that is to say, those tasks that do not require the use of violence in order to be successfully performed (as far as the two groups under scrutiny are concerned). Specifically, running a protection racket (PA) and managing the group (GM) require a certain degree of violence; yet this is not the case for other tasks, such as investing money in the legal economy (Task E-leg) or acquiring resources (Task RA). Moreover, two in three members of the Camorra clan did not discuss any act of violence, and the same goes for 27% of the Russian Mafiosi. In some instances, e.g. investments in the legal economy (money laundering), resorting to violence may even be detrimental to the success of the task. If violence does create a credible commitment among members, we should expect also to observe an impact of violence in fostering cooperation among associates in those contexts where the use of force and threats are not necessary (or even detrimental). [TABLE 3 HERE] Table 3 shows that sharing information about violent acts does have an impact on the frequency with which two actors get in contact with the purpose of carrying out violence-free activities. 16 The positive and statistically significant effect continues to be present for both the Camorra and the Russian Mafia. Not only that, but for both groups the impact of violence on tie formation remains stronger than that recorded for kinship. It is not surprising that nationality is negative in the case of the Russians, as this is a group operating outside of the country of origin (in Italy) and both money laundering and acquiring resources to run the group involve both Russians and Italians, and ultimately a great deal of cross-nationality cooperation.

26 26 6. Conclusions Actors in the underworld face severe challenges when it comes to cooperation. They cannot turn to the state for services of dispute settlement and the protection of property rights, they do not know if the person offering a deal is a honest-to-god lawbreaker, a police informant or an undercover agent. Information on reputation travels with difficulty and it is often unreliable. Thus cooperation should be rare in the underworld. And yet illegal transactions frequently take place. This paper suggests that criminals rely on at least three mechanisms conducive to cooperation. The first is the use of criminal agencies that specialize in third-party enforcement, such as the Sicilian, the Russian, the American and the Japanese Mafias. However, Mafias are limited in their geographical reach. Moreover, how do members of Mafias achieve cooperation among themselves? Two additional mechanisms are available: cutting off options and hostagetaking. Instances of the former among criminals include covering one s body with tattoos and cutting off fingers as a form of punishment. Both practices make it hard for Mafia members to leave a life of crime and re-enter legitimate society. However, these options have a significant drawback, namely, they reveal who is a member of the group. In countries where membership of a Mafia is in itself a crime, as in the United States and Italy, such a strategy would be selfdefeating. The paper has explored hostage-taking as a credible commitment among criminals. We argued that both kinship and sharing information about violence increase cooperation among lawbreakers who wish to keep their identity unknown to the authorities. Shared kinship helps to increase cooperation and compliance by giving offspring and close relatives a future orientation

27 27 that aligns their incentives with that of the criminal enterprise s boss. It is also a form of hostagetaking: if the member of the crime group still decides to defect on his associates, the latter would be able to find him and his relatives more easily if he shares kin ties with other members. In effect, both he and his immediate family are hostages of the larger criminal group. Sharing compromising information about acts of violence also helps foster cooperation by making each member hostage to all others and reducing his incentives to defect from the criminal organisation. The paper tested the extent to which kinship and sharing information on violence increase cooperation among members of two criminal groups, a Camorra clan based just outside Naples, and a Russian Mafia group that moved to Rome in the mid-nineties. We had access to the transcripts of extensive phone intercepts conducted on both groups by the Italian police. We read and manually coded the content of all conversations recorded by the police and created four network matrices recording respectively whether two actors had shared any information about violent acts; whether actors shared a kinship tie; and whether actors shared the same nationality (the latter applies to the Russian Italian group only). The dependent matrix recorded the number of times actors had established a contact (shared a tie). Using Multivariate Quadratic Assignment Procedure to test our hypotheses, we concluded that the level of cooperation is higher among members who have shared information about violent acts. Violence has a stronger effect than kinship in predicting tie formation and thus cooperation. We suggested that the common mechanism behind our regression result is a form of hostage taking that leads to higher level of cooperation among criminals. We do not argue that the sole purpose of violence or kinship is fostering cooperation. Obviously, criminal groups use violence to perform certain tasks, such as running protection rackets and punishing misbehavior, and

28 28 recruit relatives for a variety of reasons, such as lack of a better alternative. As a by-product, both factors enhance cooperation. We also found that violence has a much greater impact than kinship on tie formation and the degree of cooperation among criminals. We argued that, while kinship still remains a common device to foster cooperation among criminals, criminal groups are more likely to resort to other non-kin based mechanisms when they are available. Indeed, where mafia membership is not a crime, recruitment is mainly based on merit. The inhabitants of the underworld face special challenges in their day-to-day decisions to trust others, but as generals in the classic world, medieval merchants and modern monarchs have found ways to overcome them.

29 29 Tables Table 1. Descriptive statistics of the Camorra clan and the Russian Mafia group Neapolitan Camorra Clan Russian Mafia Group N % N % Actors Gender Male Female Kinship Kinship (extended) Nationality Russian n/a n/a Italian Violence No. of Tasks Performed n/a n/a

30 30 Table 2. QAP regression on all contacts for the Russian Mafia group and Camorra group Model 1 (Russian Mafia) Model 2 (Camorra) Dependent variable All Contacts (ln) All Contacts (ln) Intercept Kinship ** (0.072) Kinship (extended) *** --- (0.182) Violence 0.600*** (0.228) Nationality *** (0.171) --- (0.121) Group Management (GM) (0.248) Resource Acquisition (RA) (0.126) ** (0.072) *** (0.071) Investments in the Economy (E) (0.002) *** (0.055) Protection Activities (PA) *** (0.175) ** (0.066) Adj R-Square Model probability Notes: Standardised coefficients. Standard errors in brackets. *** significant at 0.01 level; ** significant at 0.05 level; * significant at 0.1 level.

31 31 Table 3. QAP regression on contacts related to the variables Investments in the Economy (E) and Resource Acquisition (RA), for the Russian Mafia group and Camorra group Dependent variable Model 1 (Russian Mafia) Only RA and E contacts (ln) Model 2 (Camorra) Only RA and E-leg contacts (ln) Intercept Kinship * (0.036) Kinship (extended) *** ---- (0.176) Nationality (0.108) Violence *** (0.195) *** (0.094) Adj R-Square Model probability Notes: Standardised coefficients. Standard errors in brackets. *** significant at 0.01 level; ** significant at 0.05 level; * significant at 0.1 level.

Cooperation in Criminal Organizations: Kinship and Violence as Credible Commitments

Cooperation in Criminal Organizations: Kinship and Violence as Credible Commitments Cooperation in Criminal Organizations: Kinship and Violence as Credible Commitments Paolo Campana, University of Cambridge Federico Varese, University of Oxford pc524@cam.ac.uk federico.varese@sociology.ox.ac.uk

More information

Peter Reuter Woodrow Wilson Center Dec. 12, 2011

Peter Reuter Woodrow Wilson Center Dec. 12, 2011 Peter Reuter Woodrow Wilson Center Dec. 12, 2011 US Mafia now limited to NY metro area Not a major player in drug markets High rate of incarceration of senior figures Occasionally no member will accept

More information

What factors make it possible for mafia groups to move successfully to new geographic regions?

What factors make it possible for mafia groups to move successfully to new geographic regions? Federico Varese, Mafias on the Move: How Organized Crime Conquers New Territories. Princeton, NJ: Princeton University Press, 2011. x + 278 Pages. USD 35.00 (cloth). What factors make it possible for mafia

More information

List of Tables and Appendices

List of Tables and Appendices Abstract Oregonians sentenced for felony convictions and released from jail or prison in 2005 and 2006 were evaluated for revocation risk. Those released from jail, from prison, and those served through

More information

CIEE Global Institute Rome

CIEE Global Institute Rome CIEE Global Institute Rome Course name: Power, Politics and Law: Mafia, Camorra and Gomorrah Course number: POLI 3001 ROIT Programs offering course: Rome Open Campus (International Relations and Political

More information

SOCIAL NETWORK ANALYSIS 2. CRIME APPLICATION

SOCIAL NETWORK ANALYSIS 2. CRIME APPLICATION SOCIAL NETWORK ANALYSIS 2. CRIME APPLICATION Growing (late) application of SNA to crime (Carrington 2011, Calderoni 2014a): 1. Personal network influence on delinquency, 2. Neighborhood influence on delinquency

More information

Paolo Campana Institute of Criminology University of Cambridge

Paolo Campana Institute of Criminology University of Cambridge The structure of human trafficking: Lifting the bonnet on a Nigerian transnational network Paolo Campana Institute of Criminology University of Cambridge Version submitted for publication in the British

More information

Days 1: Introduction to Rome

Days 1: Introduction to Rome Unit III: Rome Days 1: Introduction to Rome Essential Questions: What is classical and what are the inherent biases and differences in the concept of Eastern vs. Western? How did belief systems change

More information

CIEE Global Institute Rome

CIEE Global Institute Rome CIEE Global Institute Rome Course name: Power, Politics and Law: Mafia, Camorra and Gomorrah Course number: POLI 3001 ROIT Programs offering course: Rome Open Campus (International Relations and Political

More information

Chapter 6 Online Appendix. general these issues do not cause significant problems for our analysis in this chapter. One

Chapter 6 Online Appendix. general these issues do not cause significant problems for our analysis in this chapter. One Chapter 6 Online Appendix Potential shortcomings of SF-ratio analysis Using SF-ratios to understand strategic behavior is not without potential problems, but in general these issues do not cause significant

More information

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study Supporting Information Political Quid Pro Quo Agreements: An Experimental Study Jens Großer Florida State University and IAS, Princeton Ernesto Reuben Columbia University and IZA Agnieszka Tymula New York

More information

CIEE Global Institute Rome

CIEE Global Institute Rome CIEE Global Institute Rome Course name: Power, Politics and Law: Mafia, Camorra and Gomorrah Course number: POLI 3001 ROIT Programs offering course: Rome Open Campus (International Relations and Political

More information

Analyzing Racial Disparities in Traffic Stops Statistics from the Texas Department of Public Safety

Analyzing Racial Disparities in Traffic Stops Statistics from the Texas Department of Public Safety Analyzing Racial Disparities in Traffic Stops Statistics from the Texas Department of Public Safety Frank R. Baumgartner, Leah Christiani, and Kevin Roach 1 University of North Carolina at Chapel Hill

More information

Police Organisation Models for Combat Against Organised Crime and Terrorism Italy and Great Britain

Police Organisation Models for Combat Against Organised Crime and Terrorism Italy and Great Britain Police Organisation Models for Combat Against Organised Crime and Terrorism Italy and Great Britain 24. march 2004. - Prof. Aleksandar Fatić Professor Aleksandar Fatić, Senior Research Fellow Institute

More information

Consideration of reports submitted by States parties under article 40 of the Covenant. Concluding observations of the Human Rights Committee

Consideration of reports submitted by States parties under article 40 of the Covenant. Concluding observations of the Human Rights Committee United Nations International Covenant on Civil and Political Rights Distr.: General 19 August 2011 Original: English CCPR/C/KAZ/CO/1 Human Rights Committee 102nd session Geneva, 11 29 July 2011 Consideration

More information

ORGANIZED CRIME. Critical Concepts in Criminology. Edited by Federico Varese. Volume I Definitions and Theories. Routledge. Taylor & Francis Croup

ORGANIZED CRIME. Critical Concepts in Criminology. Edited by Federico Varese. Volume I Definitions and Theories. Routledge. Taylor & Francis Croup ORGANIZED CRIME Critical Concepts in Criminology Edited by Federico Varese Volume I Definitions and Theories Routledge Taylor & Francis Croup LONDON AND NEW YORK Acknowledgements Chronological table of

More information

Bachelorproject 2 The Complexity of Compliance: Why do member states fail to comply with EU directives?

Bachelorproject 2 The Complexity of Compliance: Why do member states fail to comply with EU directives? Bachelorproject 2 The Complexity of Compliance: Why do member states fail to comply with EU directives? Authors: Garth Vissers & Simone Zwiers University of Utrecht, 2009 Introduction The European Union

More information

Be afraid of the Chinese bearing gifts

Be afraid of the Chinese bearing gifts http://voria.gr/details.php?id=11937 Be afraid of the Chinese bearing gifts International Economics professor of George Mason, Hilton Root, talks about political influence games, Thessaloniki perspectives

More information

CODE OF CRIMINAL PROCEDURE PART ONE GENERAL PROVISIONS. Chapter I BASIC PRINCIPLES. Article 1

CODE OF CRIMINAL PROCEDURE PART ONE GENERAL PROVISIONS. Chapter I BASIC PRINCIPLES. Article 1 CODE OF CRIMINAL PROCEDURE PART ONE GENERAL PROVISIONS Chapter I BASIC PRINCIPLES Article 1 (1) This Code establishes the rules with which it is ensured that an innocent person is not convicted and the

More information

MSc in Sociology Hilary Term 2015 Sociology of Mafias

MSc in Sociology Hilary Term 2015 Sociology of Mafias Sociology of Mafias Federico.varese@sociology.ox.ac.uk NOTE: This Option runs on Friday 14:00-16:00 in the Manor Road Building, starting on the 22 st of January for 8 weeks. This document is designed to

More information

Criminal Liability of Directors and Officers in Japan Hideyuki Sakai Bingham McCutchen Murase, Sakai Mimura Aizawa -- Foreign Law Joint Enterprise

Criminal Liability of Directors and Officers in Japan Hideyuki Sakai Bingham McCutchen Murase, Sakai Mimura Aizawa -- Foreign Law Joint Enterprise Criminal Liability of Directors and Officers in Japan Hideyuki Sakai Bingham McCutchen Murase, Sakai Mimura Aizawa -- Foreign Law Joint Enterprise Introduction Japan has a comprehensive statutory scheme

More information

Democracy, Exile and Revocation: a reply to Patti Lenard. David Miller

Democracy, Exile and Revocation: a reply to Patti Lenard. David Miller Democracy, Exile and Revocation: a reply to Patti Lenard David Miller What first caught my eye when reading Patti Lenard s clear and carefully argued critique of citizenship revocation was a claim at the

More information

The Italian Mafia: The Idealtypical Form of Organized Crime? Prof. Letizia Paoli University of Leuven Faculty of Law

The Italian Mafia: The Idealtypical Form of Organized Crime? Prof. Letizia Paoli University of Leuven Faculty of Law The Italian Mafia: The Idealtypical Form of Organized Crime? Prof. Letizia Paoli University of Leuven Faculty of Law Letizia.Paoli@law.kuleuven.be University of Maastricht Studium Generale, November 24,

More information

PS 0500: Basic Models of Conflict and Cooperation. William Spaniel williamspaniel.com/classes/worldpolitics

PS 0500: Basic Models of Conflict and Cooperation. William Spaniel williamspaniel.com/classes/worldpolitics PS 0500: Basic Models of Conflict and Cooperation William Spaniel williamspaniel.com/classes/worldpolitics Outline Background The Prisoner s Dilemma The Cult of the Offensive Tariffs and Free Trade Arms

More information

Crime and Punishment Reading

Crime and Punishment Reading Crime and Punishment Reading 1 2 Every society has laws defining crimes. Every society punishes people who commit those crimes. But how should the state punish the guilty? Consider these four cases: 3

More information

The Origins of the Modern State

The Origins of the Modern State The Origins of the Modern State Max Weber: The state is a human community that (successfully) claims the monopoly of the legitimate use of physical force within a given territory. A state is an entity

More information

The Causes of Wage Differentials between Immigrant and Native Physicians

The Causes of Wage Differentials between Immigrant and Native Physicians The Causes of Wage Differentials between Immigrant and Native Physicians I. Introduction Current projections, as indicated by the 2000 Census, suggest that racial and ethnic minorities will outnumber non-hispanic

More information

Organized Crime JANA ARSOVSKA

Organized Crime JANA ARSOVSKA Organized Crime JANA ARSOVSKA Many are familiar with the traditional Italian Mafia and its notorious players Al Capone ruling the Windy City in the 1920s and Lucky Luciano establishing the first US crime

More information

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level. Published

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level. Published Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level HISTORY 9389/13 Paper 1 Document Question 13 MARK SCHEME Maximum Mark: 40 Published This mark scheme

More information

A COMPARISON BETWEEN TWO DATASETS

A COMPARISON BETWEEN TWO DATASETS A COMPARISON BETWEEN TWO DATASETS Bachelor Thesis by S.F. Simmelink s1143611 sophiesimmelink@live.nl Internationale Betrekkingen en Organisaties Universiteit Leiden 9 June 2016 Prof. dr. G.A. Irwin Word

More information

AN ANALYSIS OF INTIMATE PARTNER VIOLENCE CASE PROCESSING AND SENTENCING USING NIBRS DATA, ADJUDICATION DATA AND CORRECTIONS DATA

AN ANALYSIS OF INTIMATE PARTNER VIOLENCE CASE PROCESSING AND SENTENCING USING NIBRS DATA, ADJUDICATION DATA AND CORRECTIONS DATA Data Driven Decisions AN ANALYSIS OF INTIMATE PARTNER VIOLENCE CASE PROCESSING AND SENTENCING USING NIBRS DATA, ADJUDICATION DATA AND CORRECTIONS DATA Prepared by: Vermont Center for Justice Research P.O.

More information

Lecture 11 Sociology 621 February 22, 2017 RATIONALITY, SOLIDARITY AND CLASS STRUGGLE

Lecture 11 Sociology 621 February 22, 2017 RATIONALITY, SOLIDARITY AND CLASS STRUGGLE Lecture 11 Sociology 621 February 22, 2017 RATIONALITY, SOLIDARITY AND CLASS STRUGGLE Solidarity as an Element in Class Formation Solidarity is one of the pivotal aspects of class formation, particularly

More information

The Effects of Ethnic Disparities in. Violent Crime

The Effects of Ethnic Disparities in. Violent Crime Senior Project Department of Economics The Effects of Ethnic Disparities in Police Departments and Police Wages on Violent Crime Tyler Jordan Fall 2015 Jordan 2 Abstract The aim of this paper was to analyze

More information

PROVISIONS OF INTERNATIONAL LEGAL INSTRUMENTS ON TREATING BRIBERY IN SPORT AS A CRIME

PROVISIONS OF INTERNATIONAL LEGAL INSTRUMENTS ON TREATING BRIBERY IN SPORT AS A CRIME Strasbourg, 28 March 2011 EPAS (2011) 23 Enlarged Partial Agreement on Sport (EPAS) Hearing on the draft Recommendation on Manipulation of Sports Results PROVISIONS OF INTERNATIONAL LEGAL INSTRUMENTS ON

More information

PSC/IR 106: Basic Models of Conflict and Cooperation. William Spaniel williamspaniel.com/ps

PSC/IR 106: Basic Models of Conflict and Cooperation. William Spaniel williamspaniel.com/ps PSC/IR 106: Basic Models of Conflict and Cooperation William Spaniel williamspaniel.com/ps-0500-2017 Outline Background The Prisoner s Dilemma The Cult of the Offensive Tariffs and Free Trade Arms Races

More information

International Cooperation, Parties and. Ideology - Very preliminary and incomplete

International Cooperation, Parties and. Ideology - Very preliminary and incomplete International Cooperation, Parties and Ideology - Very preliminary and incomplete Jan Klingelhöfer RWTH Aachen University February 15, 2015 Abstract I combine a model of international cooperation with

More information

ANNUAL SURVEY REPORT: BELARUS

ANNUAL SURVEY REPORT: BELARUS ANNUAL SURVEY REPORT: BELARUS 2 nd Wave (Spring 2017) OPEN Neighbourhood Communicating for a stronger partnership: connecting with citizens across the Eastern Neighbourhood June 2017 1/44 TABLE OF CONTENTS

More information

HOW MAFIAS TAKE ADVANTAGE OF GLOBALIZATION. The Russian Mafia in Italy

HOW MAFIAS TAKE ADVANTAGE OF GLOBALIZATION. The Russian Mafia in Italy British Journal of Criminology Advance Access published October 24, 2011 doi:10.1093/bjc/azr077 BRIT. J. CRIMINOL. (2011) 1 of 19 HOW MAFIAS TAKE ADVANTAGE OF GLOBALIZATION The Russian Mafia in Italy Federico

More information

Ten years of implementation of the Convention on Action against Trafficking in Human Beings: impact and challenges ahead

Ten years of implementation of the Convention on Action against Trafficking in Human Beings: impact and challenges ahead Ten years of implementation of the Convention on Action against Trafficking in Human Beings: impact and challenges ahead Conference on the occasion of the 10 th anniversary of the entry into force of the

More information

IMPROVE JUSTICE : INQUISITORIAL OR ADVERSARY CRIMINAL PROCEEDINGS (Vilnius, Lithuania 23 April) * * * * * * * * *

IMPROVE JUSTICE : INQUISITORIAL OR ADVERSARY CRIMINAL PROCEEDINGS (Vilnius, Lithuania 23 April) * * * * * * * * * 1 IMPROVE JUSTICE : INQUISITORIAL OR ADVERSARY CRIMINAL PROCEEDINGS (Vilnius, Lithuania 23 April) NATIONAL REPORTS : Mr. Dominique Inchauspé, France. The main concern is that, very often, most of the lawyers

More information

Chapter 8: The Use of Force

Chapter 8: The Use of Force Chapter 8: The Use of Force MULTIPLE CHOICE 1. According to the author, the phrase, war is the continuation of policy by other means, implies that war a. must have purpose c. is not much different from

More information

The Campaign for Freedom of Information

The Campaign for Freedom of Information The Campaign for Freedom of Information Suite 102, 16 Baldwins Gardens, London EC1N 7RJ Tel: 020 7831 7477 Fax: 020 7831 7461 Email: admin@cfoi.demon.co.uk Web: www.cfoi.org.uk Response to the Ministry

More information

Firstly, however, I would like to make two brief points that characterise the general phenomenon of urban violence.

Firstly, however, I would like to make two brief points that characterise the general phenomenon of urban violence. Urban violence Local response Summary: Urban violence a Local Response, which in addition to social prevention measures also adopts situational prevention measures, whereby municipal agencies and inclusion

More information

Identifying Drug Labs by Analysing Sewage Systems. Bart van der Sloot, Tilburg University, TILT

Identifying Drug Labs by Analysing Sewage Systems. Bart van der Sloot, Tilburg University, TILT Identifying Drug Labs by Analysing Sewage Systems Bart van der Sloot, Tilburg University, TILT www.bartvandersloot.com Who is Bart van der Sloot Bart van der Sloot specializes in the area of Privacy and

More information

EUROPEAN UNION. Brussels, 5 March 2014 (OR. en) 2012/0036 (COD) PE-CONS 121/13 DROIPEN 156 COPEN 229 CODEC 2833

EUROPEAN UNION. Brussels, 5 March 2014 (OR. en) 2012/0036 (COD) PE-CONS 121/13 DROIPEN 156 COPEN 229 CODEC 2833 EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 5 March 2014 (OR. en) 2012/0036 (COD) PE-CONS 121/13 DROIP 156 COP 229 CODEC 2833 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: DIRECTIVE OF THE

More information

TRANSNATIONAL CRIME. An International Law Enforcement Collaboration

TRANSNATIONAL CRIME. An International Law Enforcement Collaboration TRANSNATIONAL CRIME An International Law Enforcement Collaboration Understanding Transnational organized crime involves the planning and execution of illicit business ventures by groups or networks of

More information

THE TRUTH ABOUT ORGANIZED CRIME. By Dona De Sanctis. How many Italian Americans have ever been on the FBI s Most Wanted List?

THE TRUTH ABOUT ORGANIZED CRIME. By Dona De Sanctis. How many Italian Americans have ever been on the FBI s Most Wanted List? SEMPRE AVANTI - JUNE 2005 COLUMN WORD COUNT: 1,122 THE TRUTH ABOUT ORGANIZED CRIME By Dona De Sanctis How many Italian Americans have ever been on the FBI s Most Wanted List? I raised that question recently

More information

RACKETEERING CHARGES

RACKETEERING CHARGES UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - - -x UNITED STATES OF AMERICA : -v- : INDICTMENT ANTHONY COLOMBO, : 04 Cr. GERARD CLEMENZA, CHRISTOPHER COLOMBO,

More information

GA6 Criminal accountability of United Nations officials and experts on mission

GA6 Criminal accountability of United Nations officials and experts on mission 2018 GA6 Criminal accountability of United Nations officials and experts on mission 1 Index Introduction 3 Definition of key-terms 4 General Overview 6 Major parties involved and their views 8 Timeline

More information

FEAR AND INTIMIDATION DBG and TOWERSIDE gangs so dominate the Proposed Safety Zone and the public

FEAR AND INTIMIDATION DBG and TOWERSIDE gangs so dominate the Proposed Safety Zone and the public FEAR AND INTIMIDATION. DBG and TOWERSIDE gangs so dominate the Proposed Safety Zone and the public housing areas within it, that Defendants' members act without fear of reprisal. Whether it is shooting

More information

CONSIDERATION OF REPORTS SUBMITTED BY STATES PARTIES UNDER ARTICLE 40 OF THE COVENANT. Sudan

CONSIDERATION OF REPORTS SUBMITTED BY STATES PARTIES UNDER ARTICLE 40 OF THE COVENANT. Sudan Distr. RESTRICTED CCPR/C/SDN/CO/3/CRP.1 26 July 2007 Original: FRENCH/ENGLISH Unedited version HUMAN RIGHTS COMMITTEE Ninetieth session Geneva, 9-27 July 2007 CONSIDERATION OF REPORTS SUBMITTED BY STATES

More information

KRAM We NORODOM SIHAMONI KING OF CAMBODIA

KRAM We NORODOM SIHAMONI KING OF CAMBODIA Unofficial Translation KRAM We NORODOM SIHAMONI KING OF CAMBODIA NS/RKM/0607/014 - With reference to the Constitution of the Kingdom of Cambodia - With reference to the Royal Decree N o NS/RKM/0704/124

More information

LEGAL STUDIES U1_AOS2: CRIMINAL LAW

LEGAL STUDIES U1_AOS2: CRIMINAL LAW LEGAL STUDIES U1_AOS2: CRIMINAL LAW Learning Intentions Learning Intentions: WWBAT understand and apply elements of a crime to crimes against a person. Offences Against the Person What are some of the

More information

Methodology. 1 State benchmarks are from the American Community Survey Three Year averages

Methodology. 1 State benchmarks are from the American Community Survey Three Year averages The Choice is Yours Comparing Alternative Likely Voter Models within Probability and Non-Probability Samples By Robert Benford, Randall K Thomas, Jennifer Agiesta, Emily Swanson Likely voter models often

More information

PROBLEMS OF CREDIBLE STRATEGIC CONDITIONALITY IN DETERRENCE by Roger B. Myerson July 26, 2018

PROBLEMS OF CREDIBLE STRATEGIC CONDITIONALITY IN DETERRENCE by Roger B. Myerson July 26, 2018 PROBLEMS OF CREDIBLE STRATEGIC CONDITIONALITY IN DETERRENCE by Roger B. Myerson July 26, 2018 We can influence others' behavior by threatening to punish them if they behave badly and by promising to reward

More information

EL SALVADOR Open Letter on the Anti-Maras Act

EL SALVADOR Open Letter on the Anti-Maras Act EL SALVADOR Open Letter on the Anti-Maras Act Amnesty International shares the concerns that have been expressed by a number of Salvadorean institutions and non-governmental organizations regarding Decree

More information

LECTURE NOTES LAW AND ECONOMICS (41-240) M. Charette, Department of Economics University of Windsor

LECTURE NOTES LAW AND ECONOMICS (41-240) M. Charette, Department of Economics University of Windsor Crime 1 LECTURE NOTES LAW AND ECONOMICS (41-240) M. Charette, Department of Economics University of Windsor DISCLAIMER: These lecture notes are being made available for the convenience of students enrolled

More information

Lobbying successfully: Interest groups, lobbying coalitions and policy change in the European Union

Lobbying successfully: Interest groups, lobbying coalitions and policy change in the European Union Lobbying successfully: Interest groups, lobbying coalitions and policy change in the European Union Heike Klüver Postdoctoral Research Fellow Nuffield College, University of Oxford Heike Klüver (University

More information

Supervise Whom? Disciplinary Offences Committed by Incarcerated Persons (1)

Supervise Whom? Disciplinary Offences Committed by Incarcerated Persons (1) Supervise Whom? Disciplinary Offences Committed by Incarcerated Persons (1) Some inmates pose a greater security risk and need closer supervision and monitoring than others. The trick is to identify these

More information

Disclaimer. About This Manual

Disclaimer. About This Manual Disclaimer In providing this manual, the National Police Accountability Project (NPAP) does not intend this information to be relied upon by any person or entity as a substitute for legal research by a

More information

Defining the Republic

Defining the Republic Defining the Republic READ THIS SUMMARY! According to traditional accounts, after chasing the Etruscan king from Rome, the Romans established a new government in the form of a Republic, from Res Publica,

More information

Execution Moratoriums, Commutations and Deterrence: The Case of Illinois. Dale O. Cloninger, Professor of Finance & Economics*

Execution Moratoriums, Commutations and Deterrence: The Case of Illinois. Dale O. Cloninger, Professor of Finance & Economics* Execution Moratoriums, Commutations and Deterrence: The Case of Illinois By Dale O. Cloninger, Professor of Finance & Economics* (cloninger@uhcl.edu) and Roberto Marchesini, Professor of Finance University

More information

ANNUAL SURVEY REPORT: REGIONAL OVERVIEW

ANNUAL SURVEY REPORT: REGIONAL OVERVIEW ANNUAL SURVEY REPORT: REGIONAL OVERVIEW 2nd Wave (Spring 2017) OPEN Neighbourhood Communicating for a stronger partnership: connecting with citizens across the Eastern Neighbourhood June 2017 TABLE OF

More information

2007/ACT/WKSP/007 International Cooperation in Combating Corruption Related to Money Laundering

2007/ACT/WKSP/007 International Cooperation in Combating Corruption Related to Money Laundering 2007/ACT/WKSP/007 International Cooperation in Combating Corruption Related to Money Laundering Submitted by: Thailand Capacity Building Workshop on Combating Corruption Related to Money Laundering Bangkok,

More information

14 Guilty Pleas. Part A. Introduction GUILTY PLEAS IN JUVENILE COURT

14 Guilty Pleas. Part A. Introduction GUILTY PLEAS IN JUVENILE COURT 14 Guilty Pleas Part A. Introduction 14.01 GUILTY PLEAS IN JUVENILE COURT In all jurisdictions a juvenile respondent can enter a guilty plea in a delinquency case, just as an adult defendant can in a criminal

More information

Public Safety Survey

Public Safety Survey Public Safety Survey Terrace Area Final Report Rocky Sharma Niki Huitson Irwin Cohen Darryl Plecas School of Criminology and Criminal Justice University College of the Fraser Valley February 2007-1 - Terrace

More information

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA Mahari Bailey, et al., : Plaintiffs : C.A. No. 10-5952 : v. : : City of Philadelphia, et al., : Defendants : PLAINTIFFS EIGHTH

More information

Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment

Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment UNITED NATIONS CAT Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment Distr. GENERAL CAT/C/NZL/CO/5 4 June 2009 Original: ENGLISH COMMITTEE AGAINST TORTURE Forty-second

More information

INNOCENCE PROJECT SCREENING QUESTIONNAIRE

INNOCENCE PROJECT SCREENING QUESTIONNAIRE INNOCENCE PROJECT SCREENING QUESTIONNAIRE NAME: Ricky Smith PRISONER NUMBER: #5679832 DATE OF BIRTH: July 15, 1967 SOCIAL SECURITY NUMBER: CURRENT CORRECTIONAL FACILITY AND ADDRESS: New Columbia Correctional

More information

Arrest Rates and Crime Rates: When Does a Tipping Effect Occur?*

Arrest Rates and Crime Rates: When Does a Tipping Effect Occur?* Arrest Rates and Crime Rates: When Does a Tipping Effect Occur?* D 0 N W. B R 0 W N, University of California, Riverside ABSTRACT The tipping effect of sanction certainty reported by Tittle and Rowe is

More information

Notes toward a Theory of Customary International Law The Challenge of Non-State Actors: Standards and Norms in International Law

Notes toward a Theory of Customary International Law The Challenge of Non-State Actors: Standards and Norms in International Law University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 1998 Notes toward a Theory of Customary International Law The Challenge of Non-State Actors: Standards and Norms in

More information

Uzbekistan Submission to the UN Universal Periodic Review

Uzbekistan Submission to the UN Universal Periodic Review Public amnesty international Uzbekistan Submission to the UN Universal Periodic Review Third session of the UPR Working Group of the Human Rights Council 1-12 December 2008 AI Index: EUR 62/004/2008] Amnesty

More information

Text consolidated by Tulkošanas un terminoloģijas centrs (Translation and Terminology Centre) with amending laws of:

Text consolidated by Tulkošanas un terminoloģijas centrs (Translation and Terminology Centre) with amending laws of: Text consolidated by Tulkošanas un terminoloģijas centrs (Translation and Terminology Centre) with amending laws of: 18 May 2000 22 January 2004 12 October 2006 1 June 2000 12 February 2004 14 December

More information

THE INTERNATIONAL CRIMINAL COURT BILL, MEMORANDUM.

THE INTERNATIONAL CRIMINAL COURT BILL, MEMORANDUM. BILLS SUPPLEMENT No. 13 17th November, 2006 BILLS SUPPLEMENT to the Uganda Gazette No. 67 Volume XCVIX dated 17th November, 2006. Printed by UPPC, Entebbe by Order of the Government. Bill No. 18 International

More information

Tackling Exploitation in the Labour Market Response to the Department of Business Innovation & Skills and Home Office consultation December 2015

Tackling Exploitation in the Labour Market Response to the Department of Business Innovation & Skills and Home Office consultation December 2015 Tackling Exploitation in the Labour Market Response to the Department of Business Innovation & Skills and Home Office consultation December 2015 Introduction 1. The Law Society of England and Wales ("the

More information

Financial Integrity Network Policy Alert United States Issues First Global Magnitsky Sanctions January 4, 2018

Financial Integrity Network Policy Alert United States Issues First Global Magnitsky Sanctions January 4, 2018 Financial Integrity Network Policy Alert United States Issues First Global Magnitsky Sanctions January 4, 2018 Summary On December 21, 2017, President Trump announced Executive Order 13818 to target serious

More information

PSC/IR 106: Basic Models of Conflict and Cooperation. William Spaniel williamspaniel.com/pscir-106

PSC/IR 106: Basic Models of Conflict and Cooperation. William Spaniel williamspaniel.com/pscir-106 PSC/IR 106: Basic Models of Conflict and Cooperation William Spaniel williamspaniel.com/pscir-106 Outline Background The Prisoner s Dilemma The Cult of the Offensive Tariffs and Free Trade Arms Races Repeated

More information

Trinidad and Tobago Amnesty International submission to the UN Universal Periodic Review 12 th session of the UPR Working Group, October 2011

Trinidad and Tobago Amnesty International submission to the UN Universal Periodic Review 12 th session of the UPR Working Group, October 2011 Trinidad and Tobago Amnesty International submission to the UN Universal Periodic Review 12 th session of the UPR Working Group, October 2011 B. Normative and institutional framework of the State The death

More information

EUROPEAN ARREST WARRANT AND SURRENDER PROCEDURES BETWEEN MEMBER STATES ACT (ZENPP) I. INTRODUCTORY PROVISIONS. Article 1

EUROPEAN ARREST WARRANT AND SURRENDER PROCEDURES BETWEEN MEMBER STATES ACT (ZENPP) I. INTRODUCTORY PROVISIONS. Article 1 NATIONAL ASSEMBLY OF THE REPUBLIC OF SLOVENIA No.: 212-05/04-32/1 Ljubljana, 26 March 2004 AT ITS SESSION OF 26 MARCH 2004, THE NATIONAL ASSEMBLY OF THE REPUBLIC OF SLOVENIA ADOPTED THE EUROPEAN ARREST

More information

ORGANISED CRIME AS A THREAT TO DEMOCRACY

ORGANISED CRIME AS A THREAT TO DEMOCRACY Josip Kregar ORGANISED CRIME AS A THREAT TO DEMOCRACY It was the 12 th of December of the year 1999 and I was in Zakopane in a hotel at a conference regarding, organised crime! We had been discussing for

More information

Crime and Corruption: An International Empirical Study

Crime and Corruption: An International Empirical Study Proceedings 59th ISI World Statistics Congress, 5-3 August 13, Hong Kong (Session CPS111) p.985 Crime and Corruption: An International Empirical Study Huaiyu Zhang University of Dongbei University of Finance

More information

Preserving the Integrity of Police. Officers Notes

Preserving the Integrity of Police. Officers Notes Preserving the Integrity of Police Independence and the value of notes Officers Notes Challenges at home and abroad Managing the risks Joseph Martino SIU, Counsel CACOLE 2009, Ottawa 1 The value of notes

More information

Key Facts and Figures from the Criminal Justice System 2009/2010. March 2011

Key Facts and Figures from the Criminal Justice System 2009/2010. March 2011 Key Facts and Figures from the Criminal Justice System 2009/2010 March 2011 Produced by: Matrix Evidence Ltd This booklet has been produced by Matrix Evidence Ltd. These statistics have been complied according

More information

Chapter 10 The Criminal Law and Business. Below is a table that highlights the differences between civil law and criminal law:

Chapter 10 The Criminal Law and Business. Below is a table that highlights the differences between civil law and criminal law: Chapter 10 The Criminal Law and Business Below is a table that highlights the differences between civil law and criminal law: Crime a wrong against society proclaimed in a statute and, if committed, punishable

More information

Public Safety Survey

Public Safety Survey Public Safety Survey Penticton Area Final Report Rupi Kandola Niki Huitson Irwin Cohen Darryl Plecas School of Criminology and Criminal Justice University College of the Fraser Valley February 2007-1 -

More information

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR HOUSE OF REPRESENTATIVES STAFF ANALYSIS BILL #: CS/HB 1363 Organized Criminal Activity SPONSOR(S): Gonzalez and others TIED BILLS: IDEN./SIM. BILLS: REFERENCE ACTION ANALYST STAFF DIRECTOR 1) Safety &

More information

INVESTIGATION OF CORRUPTION IN JAPAN. Tamotsu Hasegawa*

INVESTIGATION OF CORRUPTION IN JAPAN. Tamotsu Hasegawa* INVESTIGATION OF CORRUPTION IN JAPAN Tamotsu Hasegawa* I. CORRUPT PRACTICES BY GOVERNMENT OFFICIALS IN JAPAN Japan s prosecutor s offices handle and process bribery offences committed by government officials.

More information

YALE UNIVERSITY SURVEY OF HIGH SCHOOL STUDENTS SURVEY C

YALE UNIVERSITY SURVEY OF HIGH SCHOOL STUDENTS SURVEY C YALE UNIVERSITY SURVEY OF HIGH SCHOOL STUDENTS SURVEY C 2007-08 We are interested in high school students interest in politics and government. This is not a quiz and we do not expect you to know all of

More information

Speech by Judge Michael Reilly, Inspector of Prisons. 22 October Theme of Address: Protecting Human Rights in Prisons

Speech by Judge Michael Reilly, Inspector of Prisons. 22 October Theme of Address: Protecting Human Rights in Prisons Speech by Judge Michael Reilly, Inspector of Prisons at the 9 th Annual IHRC & Law Society of Ireland Conference 22 October 2011 Theme of Address: Protecting Human Rights in Prisons The theme of this workshop

More information

"The Enlargement of the EU: Impact on the EU-Russia bilateral cooperation"

The Enlargement of the EU: Impact on the EU-Russia bilateral cooperation SPEECH/03/597 Mr Erkki Liikanen Member of the European Commission, responsible for Enterprise and the Information Society "The Enlargement of the EU: Impact on the EU-Russia bilateral cooperation" 5 th

More information

Thinking Like a Social Scientist: Management. By Saul Estrin Professor of Management

Thinking Like a Social Scientist: Management. By Saul Estrin Professor of Management Thinking Like a Social Scientist: Management By Saul Estrin Professor of Management Introduction Management Planning, organising, leading and controlling an organisation towards accomplishing a goal Wikipedia

More information

Georg Lutz, Nicolas Pekari, Marina Shkapina. CSES Module 5 pre-test report, Switzerland

Georg Lutz, Nicolas Pekari, Marina Shkapina. CSES Module 5 pre-test report, Switzerland Georg Lutz, Nicolas Pekari, Marina Shkapina CSES Module 5 pre-test report, Switzerland Lausanne, 8.31.2016 1 Table of Contents 1 Introduction 3 1.1 Methodology 3 2 Distribution of key variables 7 2.1 Attitudes

More information

ICCWC Indicator Framework for Combating Wildlife and Forest Crime

ICCWC Indicator Framework for Combating Wildlife and Forest Crime International Consortium on Combating Wildlife Crime ICCWC Indicator Framework for Combating Wildlife and Forest Crime A self-assessment framework for national use ASSESSMENT GUIDELINES ASSESSMENT TEMPLATE

More information

part civics and citizenship DRAFT

part civics and citizenship DRAFT part 4 civics and citizenship The civics and citizenship toolkit A citizen is a person who legally lives in a geographical area such as a town or country. Being a citizen is like having a membership where

More information

European Parliament - Special Committee on Organised Crime, Corruption and Money Laundering (CRIM)

European Parliament - Special Committee on Organised Crime, Corruption and Money Laundering (CRIM) HearingCRIMspecialCommitteeEuropeanParliamentWRau18092012 European Parliament - Special Committee on Organised Crime, Corruption and Money Laundering (CRIM) Hearing - First session on corruption, Brussels,

More information

Bargaining Power and Dynamic Commitment

Bargaining Power and Dynamic Commitment Bargaining Power and Dynamic Commitment We are studying strategic interaction between rational players. Interaction can be arranged, rather abstractly, along a continuum according to the degree of conflict

More information

The Effect of Political Trust on the Voter Turnout of the Lower Educated

The Effect of Political Trust on the Voter Turnout of the Lower Educated The Effect of Political Trust on the Voter Turnout of the Lower Educated Jaap Meijer Inge van de Brug June 2013 Jaap Meijer (3412504) & Inge van de Brug (3588408) Bachelor Thesis Sociology Faculty of Social

More information

9 November 2009 Public. Amnesty International. Belarus. Submission to the UN Universal Periodic Review

9 November 2009 Public. Amnesty International. Belarus. Submission to the UN Universal Periodic Review 9 November 2009 Public amnesty international Belarus Submission to the UN Universal Periodic Review Eighth session of the UPR Working Group of the Human Rights Council May 2010 AI Index: EUR 49/015/2009

More information

ANNUAL SURVEY REPORT: ARMENIA

ANNUAL SURVEY REPORT: ARMENIA ANNUAL SURVEY REPORT: ARMENIA 2 nd Wave (Spring 2017) OPEN Neighbourhood Communicating for a stronger partnership: connecting with citizens across the Eastern Neighbourhood June 2017 ANNUAL SURVEY REPORT,

More information

Forms of Civic Engagement and Corruption

Forms of Civic Engagement and Corruption Forms of Civic Engagement and Corruption Disentangling the role of associations, elite-challenging mass activities and the type of trust within networks Nicolas Griesshaber, Berlin Graduate School of Social

More information